Home / Industry

Rhysida, Not Novel but Still Dangerous: DNS Revelations

Rhysida, a new ransomware currently plaguing users, may not be novel but it’s proving to be just as effective. Fortra published an in-depth analysis of the malware currently holding the data of healthcare organizations primarily based in the U.S. hostage. Other countries and their government agencies shouldn’t rest easy, though, as its operators have also gone after the Chilean army.

Since Rhysida’s emergence, the cybersecurity community has been amassing indicators of compromise (IoCs) related to the threat. AlienVault OTX, for one, has collated 50 domains and three email addresses so far.

The WhoisXML API research team dove deeper into the ransomware operators’ infrastructure via an IoC list expansion analysis in an effort to identify other potential attack vectors that may not yet be on organizations’ radar. We found:

  • 60 IP addresses to which 47 of the domains identified as IoCs resolved, eight of which are already being detected as malicious based on malware checks
  • 1,461 domains hosted on 44 dedicated IP addresses that could be part of Rhysida’s connected infrastructure, three of which turned out to be malicious based on a bulk malware check
  • 11,774 domains that contained strings found among some of the IoCs, 19 of which are already classified as malicious based on a bulk malware check

A sample of the additional artifacts obtained from our analysis is available for download from our website.

Unreported IoC Facts

We began our in-depth analysis of Rhysida by looking for more information aided by our IP, DNS, and WHOIS tools.

A bulk WHOIS lookup for the 50 domains identified as Rhysida IoCs revealed that:

  • Thirty-eight domains had publicly viewable registrars topped by GoDaddy.com (nine IoCs), followed by Network Solutions (six IoCs), and Hosting Concepts and Key-Systems (two IoCs each). The remaining 19 domains were spread across different registrars.
  • Thirty-seven domains had creation dates spanning 1995 to 2021, which could mean the ransomware operators favored using aged over newly registered domains (NRDs). The highest number, in fact, were first created 24—28 years ago.
  • One domain had an unredacted personal email address, which was historically used to register seven other domains based on reverse WHOIS searches, none of which are currently classified as malicious.
  • Ten domains had registrant organizations.
  • Twenty-nine domains had visible registrant countries led by the U.S. (17 IoCs) and Italy (four IoCs). The remaining eight IP addresses each originated from a different country.

We also performed reverse WHOIS searches for the email addresses identified as IoCs but none were used to register domains.

IoC Expansion DNS Findings

To determine other web properties that could be part of the Rhysida infrastructure, we expanded the current list of IoCs starting with DNS lookups that revealed that 47 of the domains resolved to 60 unique IP addresses, eight of which turned out to be malicious based on a bulk malware check.

A bulk IP geolocation lookup for the domain IoCs’ hosts revealed that:

  • The 60 IP addresses were spread across 15 countries led by the U.S. (35 IoCs), Germany (six IoCs), and Spain and the Netherlands (three IoCs each). The remaining 13 were spread across 11 other countries.
  • They were distributed among 33 ISPs led by Cloudflare (16 IoCs), Amazon (six IoCs), and Wix.com (three IoCs).

Reverse IP lookups for the 60 IP resolutions showed that 44 were seemingly dedicated and played host to 1,461 domains not yet on the published list of IoCs. Three of the IP-connected domains are already being detected as malicious and one continues to host a live page to date based on a screenshot lookup.

Screenshot of the page hosted on the malicious IP-connected domain galeriaanna[.]pl

To widen our threat hunting coverage, we also used these strings found among 47 of the domains identified as IoCs as Domains & Subdomains Discovery search terms:

  • ziegel-eder.
  • unitedtractors.
  • tyconz.
  • townsquaremedia.
  • thebiglifegroup.
  • snjb.
  • scharco.
  • sapros.
  • rouzbeh.
  • rlbayless.
  • ramtha.
  • polanglo.
  • pami.
  • onionmail.
  • nebraskaland.
  • koper-it.
  • knpgroup.
  • kebs.
  • jeffersoncountyhealthcenter.
  • iris-depannage-informatique.
  • imatica.
  • ict-college.
  • hollywoodforever.
  • haemokinesis.
  • greenfiber.
  • fassi.
  • eska-fuses.
  • ejercito.
  • ecaterham.
  • cvalley.
  • comune.
  • collectivitedemartinique.
  • cittanuova.
  • bmgroup.
  • bionpharma.
  • ayto-arganda.
  • axity.
  • avannubo.
  • amstutz.
  • albertanewsprint.

That led to the discovery of 11,774 domains, 19 of which turned out to be malicious according to a bulk malware check. Only one continues to host live content as of this writing. Based on a WHOIS lookup, dworekpodlipami[.]katowice[.]pl was created on 17 August 2006 with Home.pl S.A. as its registrar.

Screenshot of the page hosted on the malicious string-connected domain dworekpodlipami[.]katowice[.]pl

The 18 remaining malicious domains were either unreachable, parked, or led to blank or error pages.


Our in-depth analysis of the published Rhysida IoCs allowed us to uncover more than 18,000 possibly connected artifacts. It also shed more light on the ransomware operators’ modus operandi. For instance, we found that they seem to prefer using aged domains over NRDs, with the newest ones created two years ago. They also chose to distribute parts of their infrastructure to several service providers (registrars and ISPs alike) and countries.

If you wish to perform a similar investigation or learn more about the products used in this research, please don’t hesitate to contact us.

Disclaimer: We take a cautionary stance toward threat detection and aim to provide relevant information to help protect against potential dangers. Consequently, it is possible that some entities identified as “threats” or “malicious” may eventually be deemed harmless upon further investigation or changes in context. We strongly recommend conducting supplementary investigations to corroborate the information provided herein.

By WhoisXML API, A Domain Research, Whois, DNS, and Threat Intelligence API and Data Provider

Whois API, Inc. (WhoisXML API) is a big data and API company that provides domain research & monitoring, Whois, DNS, IP, and threat intelligence API, data and tools to a variety of industries.

Visit Page

Filed Under

Comments

Commenting is not available in this channel entry.
CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Related

Topics

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com